搜索结果: 1-5 共查到“军事学 non-malleable extractors”相关记录5条 . 查询时间(0.083 秒)
Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved Tampering and More
non-malleable codes non-malleable extractors explicit constructions
2018/11/12
Non-malleable codes were introduced by Dziembowski, Pietrzak, and Wichs (JACM 2018) as a generalization of standard error correcting codes to handle severe forms of tampering on codewords. This notion...
Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
non-malleable code privacy amplification non-malleable extractor
2018/4/20
The recent line of study on randomness extractors has been a great success, resulting in exciting new techniques, new connections, and breakthroughs to long standing open problems in several seemingly...
Non-Malleable Extractors and Codes, with their Many Tampered Extensions
Non-Malleable Extractors Codes
2016/4/7
Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the context and study of ta...
Non-Malleable Extractors with Shorter Seeds and Their Applications
extractors non-malleable extractors seed length
2016/1/25
Motivated by the problem of how to communicate over a public channel with an active adversary, Dodis and Wichs (STOC’09) introduced the notion of a non-malleable extractor. A non-malleable extractor n...
Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets
Non-Malleable Extractors Symmetric Key Cryptography Weak Secrets
2009/6/10
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice
and Bob share an n-bit secretW, which might not be uniformly random, but the adversary has at least
...